Академический Документы
Профессиональный Документы
Культура Документы
Experts do not use this method because they need to do more research. In the previous research student who did this
research can accomplished their research, but still need a new method.
To make it lighter and user friendly student need to use dynamic registering with privacy
© Elaine Rodrigues (adapted from different proposals submitted in 201630) 2018_CSU Sydney Study Centre
3. A Brief Description
of Your Proposal
The main problem is secure management of identities and compromising data privacy, presently people do not
aware about privacy. For example facebook sold their user data to company that want to buy their data.
People who aware of their privacy they use secure application such as google authenticator or 2 factor
authentication. This method will help them to secure their data privacy. The application will authenticating user
from their account send a code to their phone with short message service or phone call.
Mobile cloud computing have a big weakness, its identity theft. The way that hacker use to get the data with brute
force, phising or social engineering.
The latest authenticating method that people use in Australia is voice authenticating (Sloane, T. 2018).
2) Survey
Mobile cloud computing security and privacy survey
Do you comfortable with high security and privacy in your mobile cloud computing?
How does it affecting your daily activities while using your mobile?
Is your data security important to you?
What do you think about the problem that can happened without this method?
Do you want the user set their own privacy?
What is the best way to protect your data?
Participants will be teachers and parents
Questions will include open-ended and close-ended questions
5. Expected Outcomes 1. Improving privacy and security for mobile cloud computing.
2. Assisting user from privacy breaching and identity theft (social engineering or brute force).
3. Providing businesses that security and privacy in Australia relevant information from the dangerous of application
in a website or social media.
Reference list
Gai, K., Qiu, M., Zhao, H., Xiong, J., 2016. Privacy-aware adaptive data encryption strategy of big data in cloud computing, in Cyber
Security and Cloud Computing (CSCloud), 2016 IEEE. In: Proceedings of the 3rd International Conference on, pp. 273–278.
Werner, J., Westphall, CM and Westphall CB. Cloud identity management: A survey on privacy strategies. Journal of Network and
Computer Applications 122 (2017) pp. 29–42
Mollah, MB., Azad, MdAK and Vasilakos, A. 2017. Security and privacy challenges in mobile cloud computing: Survey and way ahead.
Journal of Network and Computer Applications 84 (2017) 38–54
Sloane, T., 2018. Voice authentication usage growing Australia multi factor authentication is what we need.
http://paymentsjournal.com/voice-authentication-usage-growing-australia-multi-factor-authentication-need/
© Elaine Rodrigues (adapted from different proposals submitted in 201630) 2018_CSU Sydney Study Centre
© Elaine Rodrigues (adapted from different proposals submitted in 201630) 2018_CSU Sydney Study Centre